Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
With all signs pointing to an increased use of and interest in project-based work in modern organizations, the better scholars... [more]
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise,... [more]
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient... [more]
This book presents a framework to model the main activities of information security management and governance. The same model... [more]
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database... [more]
Transformation and Your New EHR offers a robust communication and change leadership approach to support electronic health... [more]
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach... [more]
Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security... [more]
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers... [more]
One of the most difficult, yet important, questions regarding projects is What advantages will this project create for the... [more]
Digital transformation is a business concern; it is no longer just IT that... [more]
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides... [more]
Managing change across cultures can be tricky, and universal approaches to change management may not serve their purpose in... [more]
In addition to test questions in each of the five domains and two practice tests in print and online, this all-in-one study... [more]
This book discusses business architecture as a basis for aligning efforts with outcomes. It views BA as complementary to enterprise... [more]
Project Management: Theory and Practice, Third Edition gives students a broad and real flavor of project management. Bringing... [more]
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]
Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the... [more]
The third book in the Healthcare Payment Systems series, Prospective Payment Systems examines the various types of prospective... [more]
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information... [more]
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically... [more]
Are you still searching for the workplace that deserves someone like you? Do you really have a good understanding about what... [more]
This book introduces students to business process management, an approach that aims to align the organization's business processes... [more]
This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of... [more]
Everything that we know about the world of finance is changing before us. Innovation is happening constantly, despite the... [more]